Blog
About Jamison Utter
A10 Blog / Author / Jamison Utter
Jamison Utter
Jamison Utter is a security practitioner with over twenty years in the trenches.
Recent Posts By the Author
March 17, 2026
The Ultimate Guide to LLM Security in 2026
Large language models are no longer experimental tools running in isolated environments. They are embedded directly into production systems across enterprises: customer support…
September 15, 2025
The Failure of Attack-Centric Cybersecurity: A Veteran's Perspective
As a 20-year veteran of the cybersecurity industry–a career spanning both legitimate penetration testing and a former life as a blackhat–I’ve seen first-hand…
May 28, 2025
Enabling Secure, High-performance Infrastructure for AI and LLM Environments
Artificial Intelligence has been part of the technology landscape for decades, but recent developments in GPU processing power have accelerated its evolution and…
April 24, 2025
How Artificial Intelligence is Changing the Game in Cybersecurity
Cybersecurity isn’t about building a bigger wall. It’s about building a smarter system that adapts faster than the threat evolves. Let’s cut through…
February 13, 2025
The Dangers of Rushing into AI Adoption: Lessons from DeepSeek
As organizations race to adopt the latest advancements in artificial intelligence, DeepSeek serves as a cautionary tale about the potential dangers of rushing…
November 15, 2024
The Strategic Advantage of Hybrid DDoS Protection: Cost Efficiency and Enhanced Control
In the digital age, distributed denial of service (DDoS) attacks pose a significant threat to organizations, potentially leading to service disruptions and financial…
November 12, 2024
Why Bot Protection Matters
In the digital era, websites are increasingly vulnerable to a variety of automated threats. These threats, executed by malicious bots, can lead to…
October 23, 2024
The Need for Next-Generation Web Application Firewalls (WAFs) in Modern Threat Landscape
In today's ever-evolving threat landscape, organizations face numerous security challenges that necessitate a shift from traditional web application firewalls (WAFs) to next-generation solutions.…
September 24, 2024
The Machine War Has Begun: Cybercriminals Leveraging AI in DDoS Attacks
In the digital landscape, the integration of Artificial Intelligence (AI) into cybercriminal activities has marked the beginning of a new era of threats.…
July 16, 2024
The Importance of DDoS Threat Intelligence and Collaborative Data Sharing
In today's interconnected digital landscape, distributed denial of service (DDoS) attacks pose a significant threat to organizations of all sizes. To effectively combat…